MNS
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Owners
        • Signed-in users
        • Everyone
        Owners Signed-in users Everyone
      • Write
        • Owners
        • Signed-in users
        • Everyone
        Owners Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
    • Invite by email
      Invitee

      This note has no invitees

    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Note Insights New
    • Engagement control
    • Make a copy
    • Transfer ownership
    • Delete this note
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Note Insights Versions and GitHub Sync Sharing URL Help
Menu
Options
Engagement control Make a copy Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Owners
  • Owners
  • Signed-in users
  • Everyone
Owners Signed-in users Everyone
Write
Owners
  • Owners
  • Signed-in users
  • Everyone
Owners Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       Owned this note    Owned this note      
    Published Linked with GitHub
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    # FIT5122 Summary ## 1. Open Data issues > More and more companies are creating and/or allowing “open” data to be used. Consider a time in your industry experience project or workplace, when you have used open data. ### 1a. What is meant by “open” data? \[2 marks\] ##### Answer 1 (Wikipedia) Open data is the idea that some data should be **freely available to everyone** to use and republish as they wish, **without restrictions from copyright**, patents or other mechanisms of control. ### 1b. Give examples of four different opportunities where open data could be of use to your IE project or more widely. \[4 marks\] 1. Making government information available to the public as machine readable open data can facilitate government transparency, accountability and public participation. > 將政府信息作為機器可讀的開放數據提供給公眾,可以促進政府的透明度、問責制和公眾參與。 2. Opening up official information can support technological innovation and economic growth by enabling third parties to develop new kinds of digital application and services. > 開放官方信息可以支持技術創新和經濟增長,讓第三方開發新型數字應用及服務。 3. Visualization of data. For example, showing data about crime on map to let people understand crime distribution. > 數據的可視化。例如,在地圖上顯示犯罪數據,讓人們了解犯罪分佈。 4. Open soil and weather data can be used to create crop insurance policies for farmers. > 開放的土壤和氣象數據可用於為農民建立農作物保險政策。 5. Banking and open data. The Open Bank Project has created an open API so third-party developers can help banks build secure, modern apps for customers quickly. > 銀行和開放數據。開放銀行項目已經創建了一個開放的API,這樣第三方開發者就可以幫助銀行為客戶快速構建安全、現代的應用。 ### 1c. Describe four different possible problems with open data that a sponsor might need to consider if they were to take your Industry Experience (IE) application or similar. \[4 marks\] 1. The open data may not come from trustworthy sources. 2. The open data may be inaccurate, incorrect or duplicated. 3. The open data may be not machine-readable. 4. The open data may be not accessible all the time. 5. The open data may not be the most recent version. ## 2. Privacy issues > Systems are being developed allowing internet challenges to privacy. ### 2a. Profiling #### (i) Is profiling good? Why or why not? \[2 marks\] Profiling is to combine data from different data sources in order to get knowledge of a particular individuals. As a result, profiling technique can help technical companies to provide highly personalized Web experience for users which is good for users. #### (ii) Explain two benefits and two drawbacks of profiling technology” giving an example of each. \[8 marks\] ##### Benefit 1. Since profiling provides information of the customers, it helps in **analyzing the customer's interest in buying a particular product**. This information will **also help the organizations to market their products** based upon their customers. 2. Profiling also helps the organization to **target the customers** according to the segment in such a way that relevant marketing is done to relevant customers thus **reducing the expenses of the organization.** 3. The more information you have about your customers, the easier it is to **spot opportunities** to sell them new products. 4. Companies can use the profiling information to target their ads more precisely. For example, Amazon can provide users recommended items base on their profile. 5. Researchers can get more information about research targets. For example, the researchers researching on a certain disease can get more information about patience to help the research. ##### Drawbacks 1. Privacy is one of the principal issues raised. Profiling technologies make possible a far-reaching monitoring of an individual's behavior and preferences. Profiles may reveal personal or private information about individuals that they might not even be aware of themselves. > 隐私是提出的主要问题之一。剖析技术使得对个人行为和偏好的深远监测成为可能。概况分析可能会揭示个人的个人或私人信息,而这些信息他们自己可能都不知道。 2. Profiles can be used against people when they end up in the hands of people who are not entitled to access or use them. AN important issue related to these breaches of security is identity theft. > 当个人资料最终落入无权访问或使用它们的人手中时,它们就会被用来对付人们。与这些破坏安全的行为有关的一个重要问题是身份盗窃。 3. Profiling creates privacy concerns as details of the customer's interest may be shared publicly. 4. The customer's interest can change dynamically and hence generalization cannot be done to market the products. ### 2b. NORA #### (i) When would you use NORA? \[2 marks\] Non-obvious Relationship Awareness \(NORA\) can take information about people from many disparate sources, such as employment applications, telephone records and customer listings, and correlate relationships to find the obscure hidden connection between that information. If I am doing the pen testing and need to do the client information gathering, I can use NORA to find some useful information to target my victim. #### (ii) Explain two benefits and two drawbacks of NORA technology” giving an example of each. \[8 marks\] ##### Benefit 1. NORA can identify the suspicious activities in casino games and find the game frauds. 2. NORA can find out the individuals who may involved in terrorist attack. 3. NORA can find out the individuals who are involved in shoplifting. ##### Drawbacks 1. NORA may not give accurate result all the time as it is dependent on the data resources. 2. Citizens may not aware of the amount of data that law enforcement agencies have on them and how they are using it which can cause some privacy issues. ### 2c. Location Tracking #### (i) What is “location tracking technology”? \[2 marks\] Location tracking technology refers to technologies that physically locate and electronically record and track the movement of people or objects. #### (ii) List and describe two benefits and two drawbacks of “location tracking technology” giving an example of each. \[8 marks\] ##### Benefit 1. Helps in tracking people. For example, GPS which can be used to track people in case of an emergency. 2. Can be used ensure smooth running of business. For example, tracking the goods by the retailer in order to ensure goods are delivered to the intended place. 3. Can be benefited for Identity and Access Management (IAM). For example, Monash University can use student/staff ID card (RFID technology) to manage building access control. ##### Drawbacks 1. Raises privacy issues since people may not like their physical movements to be tracked. 2. Since GPS signal may not available everywhere, sometime the location service, like GPS navigation, may provide misleading result. ### 2d. What is jigsaw re-identification? Include in your answer one example where jigsaw re-identification could have a negative impact. \[3 marks\] Jigsaw re-identification is the method to identify someone by using two or more different pieces of information from two or more sources. Jigsaw re-identification may leak the real identity by using multiple data sources. For example, journalists can piece little bits of information together to get the background of the target. ### 2e. Everyday people are asked to provide personal information about themselves. #### (i) Name three ways that you provide personal information about yourself freely; \[3 marks\] and 1. Education background and career history shared on LinkedIn. 2. Credit card information provided for scribing Netflix. 3. Geolocation history shared on pictures posted on Instagram. 4. Online surveys which may related to personal background. #### (ii) Provide one example of what an organisation should consider when they collect this personal information \[2 marks\]. Netflix should make sure the credit card information provided by subscribers are stored in the database securely. Those information should only be used on renewing the subscription and should provide a way to allow subscribers to remove those information. ## 3. Presentations > Your team recently completed a PowerPoint presentation to the senior management team while you were away. The feedback from management was poor. You discovered the team based their messages on an old slide pack developed for highly skilled technical experts, management located overseas were invited via audio only and did not have a copy of the PowerPoint and the entire management group left the presentation still unclear on why they had been invited or the purpose of the presentation. It was also commented that there was no co-ordination within the team during the presentation. ### 3a. Explain four factors your team should have considered before giving this presentation. Include why you consider these factors important to the success of this particular presentation. \[8 marks\] 1. Audience: The audience should be considered since it is a key factor to decide what kind of the information (high-level knowledge or technical detail) should be presented during the presentation. 2. Types of the presentation: The team should also consider how the audiences will listen the presentation. If the team need to use PowerPoint for explanation, they should prepare a copy of the ppt file for the audiences who only use audio to listen the presentation. 3. Prepare of the presentation: The team should do some practices and discussion before the presentation to make sure every member are on the same page. 4. ### 3b. Are PowerPoint/ Prezzies always the best medium for presentations? Why or why not? Give four reasons to support your answer, explaining the important points you need to consider before deciding on what kind of presentation you should give. \[4 marks\] #### 4 important points to consider 1. Target audience: It is always important to identify the kind of the target audience, their levels of understanding, the size of the audience. This is because PowerPoint cannot be presented to people who are not familiar and may not be able to understand. 2. Resources used: It can be understood that computers cannot be sued in all places. Hence it is difficult to implement PowerPoint in those places. 3. Purpose: For example, the PowerPoint may not be used in the election campaign because the speaker's speech is more effective. 4. Scope of the presentation: If the scope of the presentation is targeted towards children or novice users of technology, then PowerPoint is not ideal. #### Why not using PowerPoint 1. PowerPoint presentation forms an important medium of presentation but it cannot be used in all form of verbal presentation. The reason is because there can be situations where computers or any electronic media which supports PowerPoint presentation will not be used. 2. When all the points to be presented are provided as notes in the PowerPoint presentation, then the audience may not have an interest in listening to the presentation. 3. Makes the presentation boring to listen as there will be no lively interaction between the speaker and the audience. 4. The linear nature of PowerPoint slides forces the presenter to reduce complex subjects to a set of bullet items which are too weak to support decision-making or show the complexity of an issue. #### Why using PowerPoint 1. It is easy to present and maintain eye contact with a large audience by simply advancing the slides with a keystroke, eliminating the need for handouts to follow the message. 2. It is easy to create colorful, attractive slides by using the PowerPoint templates. It is also easy to modify slides compared to other visual aids, such as charts. 3. The presentations can be created easily, one does not need to be some designing expert to prepare an amazing presentation. 4. PowerPoint presentations have always had a higher hand over others because there is always an excitement about what the slides will reveal. This keeps the listeners engaged in the whole act. ### 3c. Name two other forms of presentation that you have used in your IE team or workplace. Explain when you used each and why that particular mode of presentation was the best for that situation. \[6 marks\] #### Video presentation I had used a video presentation to explain about the features of our project, the benefits it's going to provide to the society in using the product. The reason for using the video presentation is that it is the easiest way to explain and demo our prototype during the lockdown. #### Oral presentation We also had used oral presentation for the product pitch during the expo. The reason for using oral presentation for our product pitch is that it can quickly introduce our hero feature to visitors. ## 4. Structured Communication (Meetings) > Your team are about to meet your Manager to discuss the progress of your IT project. There is a lot to cover during the meeting including a number of decisions to enable your team to move to the next stage. A number of these decisions require input from technical experts who are based in different offices around the world. ### 4a. Explain four things your team should consider (or do) before commencing this meeting. Include why you consider these factors important to the success of this meeting. [8 marks]. * The four things our team should consider before commencing the meeting are: * **Who**: Who the meeting is presented for? The meeting is conducted between the member of the IT project team and the manager, and also the technical axperts. * **Why**: The purpose of the meeting. The purpose of this meeting is to include a number of decisions to enable our team to mive to the next stage of development. * **When**: Decide the time and duration of the meeting. Firstly, Get a time that is convenience to all parties in the meeting. Secondly, choose a proper duration of the meeting. Normally, a suggested duration would be 90 minutes. Holding a meeting with a long duration will result in low efficiency. * **What**: Develop a plan for meeting. For example, set up a agenda showing what problems should be discussed and what decision need to be made at a set period of time. Also, the team need to decide the approaches of the discussion. With a plan like this, the meeting will be highly efficient. ### 4b. What are four things your team can do during the meeting to help make it more effective. Include why you consider these factors important to the success of this meeting. [8 marks] * The four things our team should do during the meeting are: * **Taking Notes.** During the meeting, one of the meeting person should be responsible for taking notes for the meeting. The notes should contain all the things that has happened during the meeting. * **Sound or Video Recording.** The reasons of take sound or video recording are basically the same as taking notes. It helps recording all the thingas that has happened during the meeting in case some of the attendents are not sure of the discussed items and want to review it. * **Avoid Distraction.** Make sure all the phone and digital devices should be muted. Ringing phone or incoming message would interrupt the meeting somehow. * **Letting the chair run the meeting.** No matter what happens, always let the chair run the meeting and following all the proper order the chair gives. The role of the chair is to control the flow and atmosphere of the meeting. If the chair does not control, the meeting will end up in a mess and low efficiency. > After the meeting, a team member who wasn’t able to attend, asked what happened and what he needed to do. No one in your team could remember. ### 4c. Explain what the team should consider doing after a meeting to avoid this problem and why. Includein your answer the important type of information that should have been communicated after the meeting. [4 marks] * In order to address this problem, team members who attend the meeting should **complete and confirm the meeting minutes** along with the date and time of the meeting. Because meeting meeting records all the things happened during the meeting. For example, meeting minute may include what are discussed during the meeting, what tasks are assigned to whom, what decisions are made and what the team are going to do next. The meeting minute can greatly help prevent things getting forgotten after the meeting. * Also, other than the meeting minute to prevent the above issues, there are several things the team need to complete after the meeting: * Follow up on action items * May have sub-committees * Track progress of the action items * Keep key stakeholders informed * Providing apologies if any mistake had been committed * Summarize the information which was mentioned in the meeting and send them to all the stakeholder and participants ## 5. Working in Teams > A team is a collection of people who must work interdependently to achieve a common goal or output. They may have a team leader or be self-managed. Teams can go through various stages before they become productive. ### 5a. Consider your experience in IE or in another team and how it relates to Tuckman’s Stages of Team Development. Provide an example for each stage of Tuckman’s model to illustrate how the model can help identify issues and improve team dynamics. [10 marks] 1. **Forming**: This is the initial stage of the team development process. In this stage, the team members introduce each other and get to know about themselves. The role of each team member will be unclear in this stage, but Everybody is busy finding their place in the team. * Example: In week one of this semester, the first time we met our team member in the IE team, we were just introducing ourselves and we did not know the roles of each other. 2. **Storming**: In this stage, people start to push against the boundaries established in the forming stage. This is the stage where many teams fail. Team members may start to challenge each other about such things as individual's working style. Conflicts and confrontation may result in some loss of performance. * Example: We had such kinds of conflict at week 2. It was happening between our IT teammate and DS teammate. They had an arguement about individual's working styles and made our process slow for a week. 3. **Norming**: In this stage, team members start to develop processes, establish ground rules, clarify who does what and how things will be done. This phase is characterized by a growing sense of “togetherness”. * Example: Our IE team had a meeting about group rules and responsibilities before the start of the development process. We set up roles and responsiblities for each member and specified who should do what and how things would be done. 4. **Performing**: In this stage, team members focus on the task as well as the team relationship to provide synergy. And team performance is delivered through perople working effectively together. * Example: We started to focus on task and our team relationship from week 3 till the end. I noticed that our team was more efficient when our relationship is good. 5. **Adjourning**: Team will reach this stage which is closure of the project. The team members with good relationships may find it difficult particularly if their future is uncertain. * Example: Our IE team is only for a semester which is 12 weeks and we will be disbanded after this period. Now it is the time we say goodbye to our team. ### 5b. How is an agile development team leader different from a traditional development team leader? Include two examples in your answer. [3 marks] 1. In traditional development team, team leaders **typically not working** with the team, while team leader in agile development team will also **take part in the project**. 2. In traditional develpment team, team leaders may have higher power of rights, however, everyone is equal within a agile development team. ![](https://i.imgur.com/m6vPvqS.png) > Conflict resolution is usually necessary in teams at some stage and you are finding this is particularly true for the current team you have been assigned to. The team have many problems which is causing much conflict. > During a team meeting, the following happened between two of your team members: Simon says to Bert: “You don’t let me have any input into this delivery cycle” Bert says: “ That’s not true, You never tell me what you want to do” This resulted in a full blown argument. ### 5c. Using “I statements”, give an example of how Simon might have better communicated and resolved any conflict before it arose. [3 marks] * Simon: 'I believe I am not given much opportunity to have any input is the delivery cycle because we can has a faster results if all of us work together.' * I fell a bit sad when we are doing the delivery cycle because i dont have anything to do, i would like to take some parts and contribute to the project. ### 5d. Give three examples of behaviours that need to be encouraged to prevent conflict. [3 marks] 1. **Consider other's inputs and contribution.** Each team member has put their effort into a specific inputs, team members will not feeling good if their input is ignored. 2. **Do not get defensive when own ideas are analyzed.** Team will only analyze your idea if they think something is not perfect and want to improve it. You own answer is not going to be solid right, so accept the fact and make a better solution with the team. 3. **Do not use feeling to control decision.** This is the worst way of making decision. If you have bad feeling on one team member, you still need to think rationally before making decision. ### Give three examples of behaviours that need to be encouraged to resolve conflict. [3 marks] 1. **Contact and communication.** Make more contact and communication with team members to avoid conflicts caused by misunderstanding. If conflicts happened, communication will also help to know what each party is thinking and it helps to resolve the conflict. 2. **Apology and forgiveness.** Normally, people in a team have the same goal and they are not in the team for argument. It would be a good idea to make apology and forgive each other after argument due to conflicts. 3. **Collaborating people to work together to find a best solution for everyone.** Not everyone in a team thinks the same way or likes the same thing, so we need to encourage all people in a team to work together in order to find the best solution that everyone satisfy. ## 6. Working in Multicultural Teams > Your Manager is struggling to understand why another team is performing poorly. You observe that the team consists of members from different nationalities including high and low context cultures as well as polychronic and monochronic backgrounds. ### Theories 1. **High Context Cultures**: A high context culture is one in which the communicators assume a great deal of commonality of knowledge and views, so that less is spelled out explicitly and much more is implicit or communicated in indirect ways. 2. **Low Context Cultures**: A low context culture is one in which things are fully (though concisely) spelled out. Things are made explicit, and there is considerable dependence on what is actually said or written. 3. **Monochronic Cultures**: Monochronic cultures like to do just one thing at a time. They value a certain orderliness and sense of there being an appropriate time and place for everything. They do not value interruptions. 4. **Polychronic Cultures**: Polychronic cultures like to do multiple things at the same time. A manager's office in a polychronic culture typically has an open door, a ringing phone and a meeting all going on at the same time. ### 6a. Explain three cross cultural differences that could be causing conflict or issues in this team. Include in your answer how these differences could cause issues with reference to the relevant theories outlined above. [9 marks] 1. **Different language.** People from non-English speaking countires find it difficult to understand the language of English since English is not their native language. Hence, it takes time for them to understand the informaiton provided during the communication leading to delays in the project. Also, misunderstanding will be happened under this circumstance. 2. **Difference in work practices.** Take my IE team as example, I found a variation in the work practices within my team. Since we are from different cultures and we have been used to the working fashion in our own countries. Hence, we need to spend time to coordinate this aspect, otherwise, issues such as time coordinating may happen. 3. **Different perception of thoughts.** People from different cultures always have different perspective on a thing. Some person are open enough to share or accept thoughts, however, some of people are shy to share their thoughts. Things like this happened to my IE team and we did spend a lot of time on this and led to delays in project. ### 6b(1). In your own words, explain why DMIS is an important model and what problem(s) it helps to resolve.[2 marks] * DMIS stands for Developmental Model of Intercultural Sensitivity. It is a framework to explain how people experience and engage cultural difference. With the help of DMIS, predictions about the effectiveness of intercultural communication can be made. ### 6b(2). Give three examples from your IE or work team experiences to illustrate how the DMIS model could help improve this team’s performance. [6 marks]. * At the beginning of IE project, I think our team was in the defense stage. In this stage, individuals consider all other cultures to be inferior to their own culture and will constantly criticize behavior or thoughts by some one from other cultures. We have a team member from India and at the time, we sometime thought her ideas were not as good as ours. * When we realised at the defense stage, we thought that it was not good for the team and the project. So, we move to the minimisation stage. In this stage, we tried to believe in each other's cultures and minimising the cultural differences. We started to understand why my Indian teammate thinks and does like that way, and she was also starting to understand us. * After minimisation stage, we moved to acceptance stage. In this stage, perople may still judge other cultures negatively but they will tend to recognize that cultures are different and they may become curious about cultural differences. Team members in our team are accepting each other's culture and indeed, our team efficiency and team dynamic are much better. ### 6c. Could working with people from different cultural backgrounds enhance your team’s effectiveness? Justify your decision with three examples from your IE team or workplace experience. [6 marks] * I am going to demonstrate this question from three aspects: 1. Working in a muticultural team helps in **developing creativity**. This is because team members will have different experience based upon their culture. Hence, collaborating these ideas will bring a unique product. * Example: Me and my Chinese teammate had experienced some blockage during ideation phase at the beginning of the semester, and our Indian teammate did provide a lot of great idea at that time and help us through that process. 2. Working in a muticultural team helps in **improving the communication skills** of the team member. * Example: Me and my other two teammates are from China and one of the teammate has low level of English Skill. We noticed that he has been improving since we started working in a team because he communicate a lot with another teammate from India who has a better English Skill than him. As the communicaion skill improved, the efficiency of team communication has been improved and the team effectiveness also increase. 3. Working in a multicultural team helps in **understanding each other**. * Working with teammates from other cultures, we may have some impacts cuased by the cultural differences. With the help of the conflict resolution and communication technique, we can not only minimize the impacts, but also understand different culture and learn from them to increase the team efficiency. ## 7. Interpersonal Communications > Your team is in the early stages of developing a new IT product. Your team is struggling to convince your manager that your ideas are good. The team is also struggling to communicate between each other, with ideas and thoughts being misinterpreted and not heard. ### 7A. Using examples from your IE or workplace experience, explain four specific listening or non verbal behavioural skills that will encourage the effective sharing of information and ideas when meeting with your manager and team members. \[8 marks\] #### ***Answer*** 1. **Head nodding**: Used to agree the points that someone else talking about 2. **Direct eye contact**: 3. **Forward-leaning posture**: 4. **Body oriented towards speaker**: 5. **Eyebrow raises**: 6. **Smiling**: 7. **Making appropriate “friendly grunts” (“uh-huh”, “mmm-hmm”)**: ### 7B. Effective questioning can assist in getting appropriate and good quality feedback from your peers and mentors. Give three examples of different types of questions you could use in your IE or workplace team, describing what type of question each is and when it might be used. \[9 marks\] #### ***Answer*** 1. **Reflective**: * > A reflective question provides respondents with an opportunity to explore their knowledge, experience and ideas. Example: What we have learned from the last iteration? * > Reflective questions involve the questioner in reflecting back the view of the team works or individul. They aare used to clarify and summarize the main points and allow further exploration of the issues. 2. **Open**: * > Open questions are useful for encouraging team members discussions. * > Open question potentially provide more creativity and information. Example: What functions should us implement in our product? 3. **Closed**: * > Closed question ask for short, specific answers. They are useful in focusing discussion, getting a commitment or gaining specific information. Example: is that clear? 4. **Hypothetical**: * > Hypothetical questions is a question that based on assumptions rather than facts, directed to an expert witness intended to elicit an opinion. Example: If we change the performance of this function, does it will improve our product performance? ### 7C. Consider a time in your IE project or workplace when a communication was not handled well. Explain how your team could have improved that communication using the relevant communication model(s) discussed in FIT5122. \[6 marks\] #### ***Answer*** In the early stage of the project, we have faced some issues related to the communication within the team. According to the Lasswell's model, we have found the problems exist because of the communication channel. We have used two communication channel and havn't diclear the purpose of each channel. To improve the communication, we need to first declear the purpose of each channel and second make sure everyone agree and follow this communication way. ## 8. Professional Issues - Codes of Ethics > Technology can be misused. The concept of a profession and its associated attributes may help control this. ### 8A. Some people think a computer related career is NOT a profession? Explain why they would think this, giving five reasons? \[5 marks\] #### ***Answer*** 1. Colledge degree not required 2. Apprenticeship not required 3. Membership of a professional society is optional 4. Certification and licensing not required 5. No specific requirements for continuing education 6. Most computer programmers, system analysts etc. are part of teams 7. The ability to harm the public can be similar to members of mature professions > A software consultant is negotiating a contract with a local community to design their traffic control system. He recommends they select the TCS system out of several available systems on the market. The consultant fails to mention that he is a major stockholder of the company producing the TCS software. (adapted from the ACS Code of Ethics). ### 8B.Considering the ACS’ Code of Ethics below, what are the responsibilities (or rights) of the following stakeholders in this scenario? Explain your response from each of the following perspectives: 1. The consultant 1. The local community 1. The chairman of the company producing the TCS software \[9 marks\] > **The ACS Code of Ethics** > As an ACS member you must uphold and advance the honour, dignity and effectiveness of being a professional. This entails, in addition to being a good citizen and acting within the law, your conformance to the following values and relevant clauses of the ACS Code of Professional Conduct > 1. The Primacy of the Public Interest: You will place the interests of the public above those of personal, business or sectional interests. > 2. The Enhancement of Quality of Life: You will strive to enhance the quality of life of those affected by your work. > 3. Honesty: You will be honest in your representation of skills, knowledge, services and products. > 4. Competence: You will work competently and diligently for your stakeholders. > 5. Professional Development: You will enhance your own professional development, and that of your staff. > 6. Professionalism: You will enhance the integrity of the ACS and the respect of its members for each other. > In a situation of conflict between the values, The Primacy of the Public Interest takes precedence over the other values. ## 9. Professional Issues - Quality and Reliability > Working as an IT professional, you have great responsibility. IT systems are often highly complex, consist of interconnected combinations of technology, organisations and people. Reliability is obviously crucial and unreliable systems can cause disaster. ### 9A. What is the difference between quality and reliability. Explain your answer using your IE or other product as an example. \[4 marks\] #### ***Answer*** The difference between quality and reliability is that quality shows how well an object performs its proper function, while reliability shows how well this object maintains its original level of quality over time, through various conditions. In IE project, if the function that we implemented in the system has good performance, for example no bugs, we can say this is quality. Reliability means how easy we can maintain the system, for instant the documentation of the system, the steps that move the system location. ### 9B. When a system fails, who do you consider responsible for the failure? The users? Developers? Quality assurance department?, Designers? UX experts? Explain your reasoning. \[3 marks\] #### ***Answer*** It should be considered based on different situation. The reason why the system failure should be analysis first. There are several reasons of the lack of reliability: * lack of the communications with the stackholders * Failure to understand complexity of design problem * Failure to design so that system “fails gracefully”(Often because the possibility of failure is never really considered) * Failure to test thoroughly * Failure to configure and install properly * General professional incompetence > The products you create in your industry experience unit and workplace need to be robust, reliable and of good quality. ### 9C. Describe five processes you used (or could use) to improve the quality of your IE or workplace product. Explain how each process could improve the quality of the product’s application or system. \[10 marks\] #### ***Answer*** ### 9D. Describe five processes you used (or could use) to improve the reliability of your IE or workplace product. Explain how each process could improve the reliability of the product’s application or system. \[10 marks\] ## 10. Intellectual Property(IP) > Your team are in the process of developing a product video for an IT product you recently finished. Team members are wanting to include photos and music from the internet in the video. ### 10a.Are all photos and music on the internet free to use? Explain your reasoning including what you need to consider when using material that has not been created by you. \[5 marks\] * No. It depends the type of license that is associated with those photographs, if no specific license is mentioned then the photos are protected by copyright and cannot be used in any cases other than those allowed under Australian copyright law as mentioned above – you may have to cite the source of a photograph. The photographs should be released under a creative commons license then they may be used for anything provided the author is cited (original source acknowledged), while some websites like Pixabay, release photographic images for use without requiring any form of author credit being given all in order for use. > You have recently accepted a new job. While you are packing up your desk at your old employer, a team member asks what are you going to do with all the development artefacts you created in your job. You are very proud of this work as it helped launched a successful product for your employer. ### 10b. Can you take a copy of these artefacts to your new employer? Justify your decision with reference to the relevant Intellectual Property considerations discussed in FIT5122. \[6 marks\] * No,Intellectual Property (IP) are anything that has been created by the human mind, such as machines, software, movies, music, art, design, etc. In many cases exclusive rights are granted to owners of IP through a combination of state and federal laws. They exist to allow creators to benefit from their work and seeks to encourage such creativity for society to benefit. You created these artefacts when you were employed by the old employer. IP belongs to the employer. So you can not take a copy of these artefacts to your new employer. ## 11. A Framework for Ethical Decision Making > Diane, an old colleague, has sought your advice on how to handle a difficult ethical dilemma. Three years ago Diane, started her own IT consulting business. She is currently designing a database management system for an HR department of a medium-sized company. Diane has involved the client in the design process, informing the CEO and Heads of HR and IT about the progress of the system. > It is now time to make decisions about the kind and degree of security to build into the system. Diane has described several options to the client. Because the system is going to cost more than they planned, the client has decided to opt for a less secure system. She believes the information they will be storing is extremely sensitive. It will include performance evaluations, medical records for filing insurance claims and salaries. > With weak security, employees working on client machines may be able to figure out ways to get access to this data, not to mention the possibility of online access from hackers. Diane feels strongly that the system should be much more secure. She has tried to explain the risks, but the CEO and Heads of HR and IT all agree that less security will do. ### 11a. Explain why the "Framework for Ethical Decision Making" could be a useful tool to help Diane work through her dilemma. \[3 marks\] * Making good ethical decisions requires a trained sensitivity to ethical issues and a practiced method for exploring the ethical aspects of a decision and weighing the considerations that should impact our choice of a course of action. Having a method for ethical decision making is absolutely essential. When practiced regularly, the method becomes so familiar that we work through it automatically without consulting the specific steps.The more novel and difficult the ethical choice we face, the more we need to rely on discussion and dialogue with others about the dilemma. Only by careful exploration of the problem, aided by the insights and different perspectives of others, can we make good ethical choices in such situations. We have found the framework for ethical decision making a useful method for exploring ethical dilemmas and identifying ethical courses of action. ### 11b. Write a brief email to Diane with your advice on how you would handle this dilemma. Include the five steps of the "Framework for Ethical Decision Making" to help explain your decision. \[12 marks – 2 marks for proper email structure, 10 marks for your ability to apply the ethical framework\] * A framework for ethical decision making consists of the following steps: * Step (1) Recognize an ethical issue
 The issue here is that Diane is concerned about the preference of senior management for the cheapest system option which she believes puts the personal (sensitive) information of their employees (potentially) at undue risk. This decision is potentially damaging to a group of employees and concerns a number of possible alternatives in security ranging from bad to good with the issue being about efficiency in terms of cost. * Step (2) Get the facts * The facts are: 1. A decision must be made on the type of security to be implemented
 2. Senior management are making the security decision (choice of)
 3. Senior management want to go with weak security
 4. The system will cost more than planned which is impacting the choice of security
 5. Diane believes information stored by the system is of a sensitive nature and at risk
 6. Diane believes weak security will put the system at risk of internal & external threats
 7. Diane has explained the situation to senior management without success so far (but how did she explain?) * The stakeholders are: 1. Senior management 2. Company employees 3. Diane (consultant) * Options are: 1. Agree to go with senior management’s decision 2. Refuse and demand maximum security
 3. Attempt to negotiate a better level of security 4. Abandon the project * Step (3) Evaluate alternative actions
 * Option (1) favors management and the company’s bottom line but places employee’s personal information at serious risk and may leave the company (and potentially Diane) open to legal and financial damage should any security breaches occur.
 * Option (2) favors Diane and the company employees but, place the likely completion of the system at risk if management decide not to go ahead due to overheads for security. This may have on-going cost for the company if this system was intended to bring in new efficiencies in respect of administration duties.
 * Option (3) In attempting to negotiate a better level of security this holds perhaps the best promise as it considers the needs of all stakeholders to some extent.
 * Option (4) Abandon the project, this is a last resort for Diane if she feels that plausible agreement / solution can be reached, but results in a loss for everyone concerned. * Step (4) Make a decision and test it
 * Option (3) is considered the most viable option in terms of attempting to meet the needs / concerns of all stakeholders. It is suggested that additional research be conducted into the various levels of security available and the cost of each versus the level of afforded protection, such information could then be put to management to better help them understand the risks and refine their decision. Consult with security experts to determine the real risk various levels of security represent to the organization and use such information in discussions with management.
An additional question may be put to management concerning the option to reduce functionality to better afford higher security (as a possibility). * Step (5) Act and reflect on the outcome
 * Implement the finalized agreed level of security within the system in a manner that causes a little disruption as possible and monitor the system in terms of performance and any security issues, assessing how the situation turned out in terms of lessons learnt. ## 12. All things Data > In today’s world, the amount of data generated is increasing exponentially. This in turn is creating increasingly complex issues for IT professionals as to how this data should be collected and used. ### 12a. Briefly explain one thing you should consider about **data quality** when: i. Collecting or acquiring data ii. Owning data iii. Transforming or consolidating data iv. Publishing or sharing data \[1 mark each – total 4 marks\] * i. quality: consider goal of using data overall, it is open data, then small changes in quality aren’t really matter, it is use this case by case. Thinking of ways to clean data, and reasons behind it. * ii. quality: what governance need to in place? * iii. quality: ensure quality of data, use documented transferred methods. Merging data consistently. * iv. quality: before publish data, quality assurance and quality control should be done via data cleaning, data annotating, and the final format should be open and easy to access * Discoverability: quality: consider what data granularity should be use fore data warehouse? ### 12b. Briefly explain one thing you should consider about **data privacy** when: i. Collecting or acquiring data ii. Owning data iii. Transforming or consolidating data iv. Publishing or sharing data \[1 mark each – total 4 marks\] * i. privacy: have I got consent? Does the consent disclose potential use of data? * ii. privacy: what is the landscape press data? should government department access to it * iii. privacy: how we identify planning data been transformed * iv. are you allowed to share sensitive data you didn’t collect, whether you generate information that exposed to jigsaw re-identification. * Discoverability: privacy: making sensitive data de-identified to prevent participants from being identified and places at risk of harm. ### 12c. Briefly explain one thing you should consider about **data security** when: i. Collecting or acquiring data ii. Owning data iii. Transforming or consolidating data iv. Publishing or sharing data \[1 mark each – total 4 marks\] * i. security: what is the data link, if the data human generated or machine generated? Is it going to abuse consequence? * ii. security: who is accountable for not secure * iii. security: access control, proper access should be given to authorised persons who required to access sensitive data. * iv. security: a repository should be chosen to store sensitive data, only authorised persons can access data. * Discoverability: security: if visually hardware should be built? ### ethical * i. ethical: sourcing data legally, consent should be obtained from participants before data collection, data should not be used beyond original purpose of collection without consent. * ii. ethical: when collect data from multiple sources, how can explain ownership, who owns the copyright? * iii. ethical: appropriate cite original use of data, otherwise related legal standards/term &conditions of use will be breached. Data published should be approved by an individual ethical committee. * iv. ethical: the person that publishes the data must hold appropriate rights (e.g. copyright) to do so. Publishing or sharing data should not cause harm or contribute to discrimination to others. * Discoverability: ethical: removing identifiable data according to guidance and consent forms.

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password

    or

    By clicking below, you agree to our terms of service.

    Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully